Endpoint Security: Continual Drive to Improve Cost & Performance

Jason Stradley is a visionary security executive with an entrepreneurial spirit and the ability to execute against his vision. Known for strong organizational and thought leadership he combines those qualities to communicate his vision to motivate others to excellence.

Jason has experience in a wide variety of security technologies such as encryption, IDS/IPs, Data Leakage prevention, Security Information and Event Management, Enterprise Threat Management and Vulnerability Management and Identity and Access Management solutions to name a few.

The South West Regional Cyber Crime Unit are involved in fighting cyber crime along with other national and international law enforcement agencies.

As such they see certain traits, methodologies and vulnerabilities over and over again. Lisa Forte, the Cyber Protect Officer for the Unit, will be explaining how businesses should adapt their thinking to "see what the hackers see" to better defend themselves against the threat she sees every day.

Lisa will also be talking about the importance of planning and war gaming out cyber attack scenarios. The businesses that have a plan are the businesses that survive to tell the tale. Lisa will be using real life cases that the Cyber Crime Unit have dealt with to highlight how quickly things can go wrong as well as providing some simple steps businesses can apply to reduce their vulnerability.

Speaker bio:

Lisa Forte is the Cyber Protection Officer for the South West Police Cyber Crime Unit. Her role involves helping businesses of all shapes and sizes defend against the ever growing cyber threat. Prior to working in the Cyber Crime Unit Lisa worked in intelligence for Counter Terrorism agencies in the UK.

Cyber extortion has reached new proportions, including ransomware attacks such as WannaCry in May 2017, and SamSam affecting major hospitals in 2016.

Considering the payoff, cybersecurity experts expect these attacks to only increase. This model of extortion attacks is affecting everyone, and it is only going to become more popular as hackers gain access to affordable “Ransomware-as-a-Service” tools to aid their cause.

CEOs are major targets, as they manage extremely sensitive data that can have a real impact on everything from future corporate strategy to public stock performance.

Join this interactive webinar and learn more about the tools and strategies needed for elevating your cyber resilience.

About the Presenter:
Ondrej Krehel is the CEO and Founder of LIFARS LLC, an international cybersecurity and digital forensics firm. He’s the former Chief Information Security Officer of Identity Theft 911, the nation’s premier identity theft recovery and data breach management service. He previously conducted forensics investigations and managed the cyber security department at Stroz Friedberg and the Loews Corporation. With two decades of experience in computer security and digital forensics, he has launched investigations into a broad range of IT security matters—from hacker attacks to data breaches to intellectual property theft.

2017 was a bumper year for Ransomware; with WannaCry & notPetya grabbing headlines around the world and instilling fear in the hearts of security professionals around the globe.

With GDPR regulations on the horizon and potentially huge fines for badly protected and breached data, security professionals need to improve their defensive stature and ensure that their organisation's data is fully protected from end to end.

This roundtable discussion will discuss how to best protect your data so if it falls into the wrong hands, you won't end up on the front of the worlds' papers!

Ask any security practitioner and they’ll tell you that ransomware is on the rise. Recent high-profile events like Petya, WannaCry, and others have captured media attention both the trade and mainstream press and, by extension, have captured executive attention at the highest levels of organizations.

High profile events like these create havoc in the short term, but in the long term may actually help to foster security improvements provided that security teams are prepared to leverage them when they occur. Specifically, by preparing in advance “talking points” for situations like these, and by channeling executive interest and visibility when they occur, security practitioners can help make progress in areas that are normally challenging. For example, by securing budget to address known problem areas, prioritizing and gaining visibility for known risks, or by securing additional personnel to address skill shortages. The key to doing this is in the planning.

This session will focus on the talking points; both specific talking points arising from these events that practitioners can tailor for their situation as well as how they can prepare talking points for future situations should they arise.

Hacking and malware attacks, including ransomware attacks, are a major cause of breaches in 2017. With high-profile ransomware attacks on the rise, enterprises and small businesses worldwide are looking to better secure their data from cyber criminals and more nefarious attackers.

Join this interactive Q&A session with security experts across industries to learn more about:
- What can we learn from Wannacry, NotPetya and other ransomware attacks seen in 2017
- Financial motivation or disruption
- Who is at risk of a ransomware attack
- What to do before, during, and after a ransomware attack
- How can we better protect our businesses, organizations, governments and infrastructure from cyber attacks
- Urgent steps to take today

SentinelOne recently released a report with De Montfort University to examines the differing levels of sophistication on the part of the attackers and trends and tactics use to commission a payment from organizations.

Join this session as we discuss the common trends highlighted in the report including:
- Time criticality and deadline sensitivity
- Consequences for not paying or missing the demand
- The Customer Service Approach on how to pay the ransom
- The use of a variety of imagery
- Preferred mechanism for payment

About the presenter:
Jeremiah’s InfoSec career spans nearly 20 years and has lived a literal lifetime in computer security to become one of the industry’s biggest names. At SentinelOne, Jeremiah is responsible for designing effective defense strategies against ever-evolving attacks including ransomware. Prior to joining, Jeremiah was the Founder & CEO of WhiteHat Security, specializing in website risk management.

In the aftermath of the Equifax data breach, both consumers and enterprises are scrambling for ways to minimize the impact. Since highly personal information was exposed (social security numbers, addresses, birthdays), the implications of this breach could haunt us in the long-term future.

What are the lessons of this breach to individuals, as well as organizations?

Join this interactive panel discussion with security experts to learn:
- The short and long-term effects of this data breach
- What you can do to protect yourself and your organization
- How to protect against future scams
- Why breaches happen and how organizations can improve their breach prevention efforts, as well as employ technologies and process for faster breach detection and response
- How to improve cyber security going into 2018

On Thursday, 21 September, from 14.00 to 15.30 BST/15.00 to 16.30 CET, Kaspersky Lab will be joined by senior business and IT experts at the Kaspersky CyberSecurity Summit 2017, to debate the top threats facing enterprises – and what they mean for CISOs in terms of incident response, business continuity and risk management. Participants will leave armed with clear, actionable intelligence.

The event will be moderated by Geoff White, Television news reporter (BBC and Channel 4 News) and investigative journalist.

The cyberthreat landscape is becoming ever more complex and destructive. Over the last 12 months, attacks targeting enterprises have increased significantly in both number and range – with a measurable impact on operations, revenue, customers and reputation.

In this summit, experts from IT and business will discuss the most dangerous cyberthreats targeting enterprises, how to stay protected even when breached, as well as threat intelligence, incident response, the legal, insurance and communications challenges – and more.

Participants will be able to join in the debate and ask questions. They will leave armed with clear, actionable intelligence.

With 143 million personally identifiable records stolen, the recent Equifax data breach is one of the largest and most damaging cyber-attacks to date. Hackers may have accessed highly valuable information, including our social security numbers, addresses, birth dates and credit card information.

What can we do do contain the damage as consumers, as well as organizations? How can we move on from this breach?

Join this interactive panel discussion with cyber security experts across the spectrum to hear their thoughts on:
- The key takeaways consumers and enterprises should act on to protect against cyber scams and attacks related to this breach
- Managing IT risk and vulnerabilities
- How to improve breach prevention, detection and response
- What to expect in the future

Join this interactive Q&A panel to discover the biggest lessons of the recent Equifax breach and how to apply them toward improving your and your organizations cyber security.

Viewers will learn:
- The magnitude of the impact of this breach across consumers and industries
- The true costs of a breach
- How to discover if your personal information has been exposed and what you can do about it
- What to expect in terms of cyber threats in the future
- How can to protect your data and secure your organization
- Expert recommendations on improving breach protection, detection and response

The massive Equifax data breach may involve as many as 143 million US consumers whose personal information was accessed by hackers between May and July.

Join this interactive discussion with security experts and researchers to find out how this breach impacts your life and potentially, your organization.
- Timeline of Equifax and why this may be the worst hack yet
- Has your data been exposed in the hack?
- What should you do right away?
- When to expect the scams and cyber attacks related to this hack?
- Expert recommendations on how to stay safe online in the age of breaches and ransomware attacks.

Data breaches have become frequent and more impactful in the last couple of years, with the latest massive breach revealed by Equifax taking the cake. Equifax is one of three major credit reporting agencies, and this breach leaves pretty much everyone's financial data vulnerable to cyber criminals.

Join this interactive panel and ask your most pressing questions, as well as learn about:
- How this breach exposing personal data, including social-security numbers, for 143 million Americans will affect you and your business
- What you can do today to minimize your data exposure and protect against cyber attacks
- What to expect in the future
- Expert recommendations on how to improve your personal cybersecurity and your company's security.

Chances are, you and a lot of people you know could be a few of the 143 million consumers affected by the major data breach recently disclosed by Equifax.

Join this interactive Q&A panel to discover how this breach impacts you and the steps you can take today to minimize the likelihood of a future cyber attack related to this breach:
- How to discover if your personal information has been exposed in this breach
- What is the impact on consumers and organizations of all sizes
- What to expect in the future? Cyber threats related to the breach
- How can to protect your data and secure your organization

There are many challenges for data privacy legislation within a boundary-less cloud computing and World Wide Web environment. Despite its importance, there is limited research around data privacy law gaps and alignment, and the legal side of the security ecosystem seems to constantly be playing catch-up.
This research is supported by STRATUS (Security Technologies Returning Accountability, Trust and User-Centric Services in the Cloud) (https://stratus.org.nz),

Equifax, a massive credit reporting agency, disclosed that a data breach it discovered on July 29 may have impacted up to 143 million consumers in the United States. That's almost half the country.

Join this interactive Q&A panel to discover how this breach impacts you:
- Who is a victim and what this breach means for consumers and businesses
- What should Equifax customers do
- How to protect against and detect breaches faster
- How can we protect our data against future breaches

There is a need to protect ALL Internet of Things (IoT) devices from unknown vulnerabilities. When IoT is augmented with sensors and actuators, the technology becomes an instance of the more general class of cyber-physical systems, which also encompasses technologies such as smart grids, virtual power plants, smart homes, intelligent transportation and smart cities. Each thing is uniquely identifiable through its embedded computing system but is able to interoperate within the existing Internet infrastructure. Experts estimate that the IoT will consist of about 30 billion objects by 2020. This session will discuss the key findings.
Viewers will learn:
• Current trends in Cyber attacks for IoT
• Security Metrics for IoT
• Oversight of third parties in IoT
• How to measure cybersecurity preparedness for IoT
• Automated approaches to integrate Security into IoT

Ekta Mishra, Research Analyst of CSA and David Siah, Country Manager of TrendMicro Singapore

Cloud as the enabler of Internet of Things (IoT) and data analytics, the incorporation of cloud computing is critical for the successful implementation of these leading-edge technologies. Countries and organizations moving towards Industry 4.0 are highly dependent on cloud computing, as it is the basis for this revolutionary transition. However, complications and confusion arising from regulations (or lack thereof) surrounding cloud usage hinder cloud adoption.

During this webcast, we will discuss some of the findings from the CSA “State of Cloud Adoption in Asia Pacific (APAC) 2017” report and examine the availability and affordability of cloud computing in the APAC region.

Healthcare industry would be one of the major adopters of IoT. What are the security challenges of healthcare industry? How does IoT change the security equation in healthcare?

Presenter:

Minatee leads the Security Center of Excellence (ScoE) in Philips HealthTech and has been instrumental in setting up the SCoE within Philips. The SCoE , which is a central organization responsible for doing cutting edge work in the field of security testing, doing secure code analysis , finding the vulnerable components within the software and more. Minatee has been in the field of software for 18 years right from designing and architecting systems to securing in systems, She has a bachelors in electrical engineering from NIT and Masters from IIT Kharagpur. She holds CISSP, GCIH, CEH certifications. She has been a speaker at various forums/conferences like RSA, RISC, NullCon, BPM etc.

This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.